Filter Blogs expand_more
Blog add
Authors add
Solutions add
Products add
Product Categories add
11 Results for 'Cloud'

Ovum Report on Cloud-Based Authentication

By Jacquelyn Painter
December 13, 2017
In order to ensure IT agility, cloud-based authentication is a requirement. 

Enterprise Authentication Comes to the Cloud: Introducing Our Newest Solution, IntelliTrust

By Mike Byrnes
July 19, 2017
IntelliTrust brings the best possible security of smart credentials from the on-premise world of management to mobile devices and the cloud without the complexities of building or managing its infrastructure. 

3 Ways Financial Institutions Benefit From The Cloud

By Entrust Datacard
July 22, 2015
Cloud computing is a platform that's being leveraged by every kind of business, but certain industries are slower to warm to it than others. Banking, which is characterized by a need for top-tier enterprise security, is one sector where high security needs create a strong sense of trepidation when it comes to migrating to virtualized business platforms. The debate around enterprise cloud computing is hardly unique to banking. From real estate and education to insurance providers and oil/gas companies, there are conversations in IT boardrooms about the relative risks and rewards of migrating to a virtualized infrastructure, where the prospect of lower costs and increased efficiency clash with the perceived heightened vulnerability of cloud platforms

Enhancements Coming to Entrust Cloud

By Scott Shetler
July 17, 2014
On or about July 25, we will release Entrust Cloud 2.1, which contains a number of capabilities designed to make your life easier. The following is a service-by-service summary of the upcoming Home, SSL and Device Certificate enhancements you can expect. 

iCloud Hack Highlights Need For Strong Authentication

By Entrust Datacard
September 09, 2014
Entrust Datacard covers the fallout of another major data breach, this time affecting sensitive photos stored on celebrities' iCloud accounts. In the wake of the incident, Apple has released a statement calling the breach "a very targeted attack on user names, passwords and security questions," adding that "none of the cases we have investigated has resulted from any breach in any of Apple's systems, including iCloud and Find My iPhone."

Bracing the Internet's backbone with stronger authentication

By Entrust Datacard
March 29, 2016
Whether you're running a massive, top-secret facility that houses NSA intelligence, you're a health care provider that relies on its data center for access to patients' medical records or you're a world-leading cloud provider, slacking on authentication is just about the dumbest thing you can do. Keep your organization's data – or your customers' data in the case of a cloud vendor – safe with smart, strong authentication.  

RSA Conference USA 2016 - Secure Your Place in the Cloud

By Entrust Datacard
March 07, 2016
Last week, information security professionals from across the globe gathered in San Francisco, Calif. for RSA Conference 2016 USA. Entrust Datacard provides an overview of the high level take-aways. 

Entrust at RSA: The Week Ahead

By Entrust Datacard
February 26, 2013
Entrust’s gearing up for a big, big week. Our go-to guys will focus on four key security areas: cloud, mobility, malware and CJIS compliance.

CentCom Social Media Compromised— Who Is Responsible for Your Enterprise Security?

By Mike Byrnes
January 19, 2015
The digital world is constantly evolving. More organizations are using mobile, cloud and social media solutions as vessels to connect and communicate with their employees, customers and citizens. Social media platforms such as Twitter, YouTube and LinkedIn provide real-time channels to communicate our news, views and also can be a critical tool for public safety used to inform the public. Last week, the announcement of an attack on US Central Command (CentCom) social media accounts made headlines.

Cloud-Based Identities for the New Era of Work

By Jenn Markey
July 10, 2020
Page 1 of 2